Show filters
77 Total Results
Displaying 41-50 of 77
Sort by:
Attacker Value
Unknown

CVE-2021-20182

Disclosure Date: February 23, 2021 (last updated February 22, 2025)
A privilege escalation flaw was found in openshift4/ose-docker-builder. The build container runs with high privileges using a chrooted environment instead of runc. If an attacker can gain access to this build container, they can potentially utilize the raw devices of the underlying node, such as the network and storage devices, to at least escalate their privileges to that of the cluster admin. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
Attacker Value
Unknown

CVE-2020-27368

Disclosure Date: January 14, 2021 (last updated February 22, 2025)
Directory Indexing in Login Portal of Login Portal of TOTOLINK-A702R-V1.0.0-B20161227.1023 allows attacker to access /icons/ directories via GET Parameter.
Attacker Value
Unknown

CVE-2020-17519

Disclosure Date: January 05, 2021 (last updated February 22, 2025)
A change introduced in Apache Flink 1.11.0 (and released in 1.11.1 and 1.11.2 as well) allows attackers to read any file on the local filesystem of the JobManager through the REST interface of the JobManager process. Access is restricted to files accessible by the JobManager process. All users should upgrade to Flink 1.11.3 or 1.12.0 if their Flink instance(s) are exposed. The issue was fixed in commit b561010b0ee741543c3953306037f00d7a9f0801 from apache/flink:master.
Attacker Value
Unknown

CVE-2020-35658

Disclosure Date: December 23, 2020 (last updated February 22, 2025)
SpamTitan before 7.09 allows attackers to tamper with backups, because backups are not encrypted.
Attacker Value
Unknown

CVE-2020-26549

Disclosure Date: November 17, 2020 (last updated February 22, 2025)
An issue was discovered in Aviatrix Controller before R5.4.1290. The htaccess protection mechanism to prevent requests to directories can be bypassed for file downloading.
Attacker Value
Unknown

CVE-2020-1908

Disclosure Date: November 03, 2020 (last updated February 22, 2025)
Improper authorization of the Screen Lock feature in WhatsApp and WhatsApp Business for iOS prior to v2.20.100 could have permitted use of Siri to interact with the WhatsApp application even after the phone was locked.
Attacker Value
Unknown

CVE-2020-26183

Disclosure Date: October 15, 2020 (last updated February 22, 2025)
Dell EMC NetWorker versions prior to 19.3.0.2 contain an improper authorization vulnerability. Certain remote users with low privileges may exploit this vulnerability to perform 'nsrmmdbd' operations in an unintended manner.
Attacker Value
Unknown

CVE-2020-15224

Disclosure Date: October 14, 2020 (last updated February 22, 2025)
In Open Enclave before version 0.12.0, an information disclosure vulnerability exists when an enclave application using the syscalls provided by the sockets.edl is loaded by a malicious host application. An attacker who successfully exploited the vulnerability could read privileged data from the enclave heap across trust boundaries. To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application. The vulnerability would not allow an attacker to elevate user rights directly, but it could be used to obtain information otherwise considered confidential in an enclave, which could be used in further compromises. The issue has been addressed in version 0.12.0 and the current master branch. Users will need to to recompile their applications against the patched libraries to be protected from this vulnerability.
Attacker Value
Unknown

CVE-2020-26182

Disclosure Date: October 14, 2020 (last updated February 22, 2025)
Dell EMC NetWorker versions prior to 19.3.0.2 contain an incorrect privilege assignment vulnerability. A non-LDAP remote user with low privileges may exploit this vulnerability to perform 'saveset' related operations in an unintended manner. The vulnerability is not exploitable by users authenticated via LDAP.
Attacker Value
Unknown

CVE-2020-15175

Disclosure Date: October 07, 2020 (last updated February 22, 2025)
In GLPI before version 9.5.2, the `​pluginimage.send.php​` endpoint allows a user to specify an image from a plugin. The parameters can be maliciously crafted to instead delete the .htaccess file for the files directory. Any user becomes able to read all the files and folders contained in “/files/”. Some of the sensitive information that is compromised are the user sessions, logs, and more. An attacker would be able to get the Administrators session token and use that to authenticate. The issue is patched in version 9.5.2.